The global race for technological superiority : discover the security implications / / edited by Fabio Rugge |
Pubbl/distr/stampa | Milan, Italy : , : Ledizioni, , [2020] |
Descrizione fisica | 1 electronic resource (183 p.) |
Disciplina | 327 |
Collana | Pubblicazioni ISPI |
Soggetto topico |
Technology and international relations
Cyberspace - Political aspects Security, International Cyberspace - Security measures |
ISBN | 88-5526-144-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction / John R. Allen, Giampiero Massolo -- Emerging disruptive technologies and international stability / Fabio Rugge -- Disruptive technologies in military affairs / Gabriele Rizzo -- Why 5G requires new approaches to cybersecurity / Tom Wheeler, David Simpson -- AI in the aether : military information conflict / Tom Stefanick -- Artificial intelligence, geopolitics, and information integrity / John Villasenor -- Norms and strategies for stability in cyberspace / Mariarosaria Taddeo -- Will authoritarian regimes lead in the technology race? / Samuele Dominioni. |
Record Nr. | UNINA-9910367723303321 |
Milan, Italy : , : Ledizioni, , [2020] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
The Google predicament [[electronic resource] ] : transforming U.S. cyberspace policy to advance democracy, security, and trade : hearing before the Committee on Foreign Affairs, House of Representatives, One Hundred Eleventh Congress, second session, March 10, 2010 |
Pubbl/distr/stampa | Washington : , : U.S. G.P.O., , 2010 |
Descrizione fisica | 1 online resource (iii, 125 pages) |
Soggetto topico |
Cyberspace - Security measures
Internet - Political aspects - China Internet - Economic aspects Information warfare - United States - Prevention National security - United States |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Google predicament |
Record Nr. | UNINA-9910699572903321 |
Washington : , : U.S. G.P.O., , 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
H4ckers5 wanted : an examination of the cybersecurity labor market / / Martin C. Libicki, David Senty, Julia Pollak ; cover design by Dori Walker |
Autore | Libicki Martin C. |
Pubbl/distr/stampa | Santa Monica, California : , : RAND, , 2014 |
Descrizione fisica | 1 online resource (107 p.) |
Disciplina | 331.7/610058 |
Soggetto topico |
Computer crimes - Prevention
Cyberspace - Security measures Professions - Supply and demand Hackers |
ISBN |
0-8330-8501-8
0-8330-8503-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright; Preface; Contents; Figures and Table; Summary; Acknowledgments; Abbreviations; Prologue; Organization; Chapter One: Why Has Demand Risen Sharply?; The Federal/Military Cybersecurity Workforce Problem; Levels of the Game; Chapter Two: What Others Have Observed; GAO, Cybersecurity Human Capital: Initiatives Need Better Planning and Coordination; Partnership for Public Service and BAH, "Cyber IN-Security: Strengthening the Federal Cybersecurity Workforce"; CSIS Commission on Cybersecurity for the 44th Presidency,; DoD, Cyber Operations Personnel Report
Homeland Security Advisory Council, Cyber Skills Task Force Repor tAmyas Morse, The UK Cyber Security Strategy: Landscape Review; Other Articles; Conclusions; Chapter Three: Findings from Interviews and Statistics; How Employers Meet their Need for Cybersecurity Professionals; NSA; Central Intelligence Agency; USCYBERCOM; USAF; The Role of Education; Cybersecurity Programs; Overall Statistics; Chapter Four: The Economics of the Cybersecurity Labor Market; A Simplified View of the Labor Market for Cyberprofessionals; The Adjustment of Labor Demand to Shocks; Differences in Human Capital Factors Related to Government Agency Characteristics Geographic Considerations; Summary; Chapter Five: Upper-Tier Cybersecurity Professionals and Policy Options; The Search for the Upper-Tier Cybersecurity Professional; Policy Options for Meeting Cybersecurity Needs; Recruit Early; Use Foreign Nationals; Differentiate Job Categories More Precisely; Address Civil Service Issues; Review Veterans' Preferences; Use Guard and Reserve Units; Outsource More; Reducing the Demand for Cybersecurity Professionals; Chapter Six: Conclusions; In the Longer Run; References |
Record Nr. | UNINA-9910220146103321 |
Libicki Martin C.
![]() |
||
Santa Monica, California : , : RAND, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
HotWeb 2017 : proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies : San Jose, CA, USA, October 14, 2017 / / Qun Li, Songqing Chen |
Autore | Li Qun <1912-2012, > |
Pubbl/distr/stampa | New York : , : Association for Computing Machinery, , 2017 |
Descrizione fisica | 1 online resource (97 pages) |
Disciplina | 355.343 |
Soggetto topico |
Cyberspace - Security measures
World Wide Web |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910376032403321 |
Li Qun <1912-2012, >
![]() |
||
New York : , : Association for Computing Machinery, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
How to Measure Anything in Cybersecurity Risk / / Douglas W. Hubbard and Richard Seiersen |
Autore | Hubbard Douglas W. <1962-> |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Wiley-Blackwell |
Descrizione fisica | 1 online resource (366 pages) |
Disciplina | 658.478 |
Soggetto topico |
Cyberspace - Security measures
Cyberterrorism Risk management |
ISBN |
1-119-89232-5
1-119-89231-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- Foreword for the Second Edition -- Acknowledgments -- Preface -- How to Measure Anything in Cybersecurity Risk -- Introduction -- Why We Chose This Topic -- What Is This Book About? -- We Need More Than Technology -- Part I Why Cybersecurity Needs Better Measurements for Risk -- Chapter 1 The One Patch Most Needed in Cybersecurity -- Insurance: A Canary in the Coal Mine -- The Global Attack Surface -- The Cyber Threat Response -- A Proposal for Cybersecurity Risk Management -- Notes -- Chapter 2 A Measurement Primer for Cybersecurity -- The Concept of Measurement -- A Taxonomy of Measurement Scales -- The Object of Measurement -- The Methods of Measurement -- Notes -- Chapter 3 The Rapid Risk Audit: Starting With a Simple Quantitative Risk Model -- The Setup and Terminology -- The Rapid Audit Steps -- Some Initial Sources of Data -- The Expert as the Instrument -- Supporting the Decision: Return on Controls -- Doing "Uncertainty Math" -- Visualizing Risk With a Loss Exceedance Curve -- Where to Go from Here -- Notes -- Chapter 4 The Single Most Important Measurement in Cybersecurity -- The Analysis Placebo: Why We Can't Trust Opinion Alone -- How You Have More Data than You Think -- When Algorithms Beat Experts -- Tools for Improving the Human Component -- Summary and Next Steps -- Notes -- Chapter 5 Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk -- Scanning the Landscape: A Survey of Cybersecurity Professionals -- What Color Is Your Risk? The Ubiquitous-and Risky-Risk Matrix -- Exsupero Ursus and Other Fallacies -- Communication and Consensus Objections -- Conclusion -- Notes -- Part II Evolving the Model of Cybersecurity Risk -- Chapter 6 Decompose It: Unpacking the Details -- Decomposing the Simple One-for-One Substitution Model.
More Decomposition Guidelines: Clear, Observable, Useful -- A Hard Decomposition: Reputation Damage -- Conclusion -- Notes -- Chapter 7 Calibrated Estimates: How Much Do You Know Now? -- Introduction to Subjective Probability -- Calibration Exercise -- More Hints for Controlling Overconfidence -- Conceptual Obstacles to Calibration -- The Effects of Calibration -- Beyond Initial Calibration Training: More Methods for Improving Subjective Judgment -- Notes -- Answers to Trivia Questions for Calibration Exercise -- Chapter 8 Reducing Uncertainty with Bayesian Methods -- A Brief Introduction to Bayes and Probability Theory -- An Example from Little Data: Does Multifactor Authentication Work? -- Other Ways Bayes Applies -- Notes -- Chapter 9 Some Powerful Methods Based on Bayes -- Computing Frequencies with (Very) Few Data Points: The Beta Distribution -- Decomposing Probabilities with Many Conditions -- Reducing Uncertainty Further and When to Do It -- More Advanced Modeling Considerations -- Wrapping Up Bayes -- Notes -- Part III Cybersecurity Risk Management for the Enterprise -- Chapter 10 Toward Security Metrics Maturity -- Introduction: Operational Security Metrics Maturity Model -- Sparse Data Analytics -- Functional Security Metrics -- Functional Security Metrics Applied: BOOM! -- Wait-Time Baselines -- Security Data Marts -- Prescriptive Analytics -- Notes -- Chapter 11 How Well Are My Security Investments Working Together? -- Security Metrics with the Modern Data Stack -- Modeling for Security Business Intelligence -- Addressing BI Concerns -- Just the Facts: What Is Dimensional Modeling, and Why Do I Need It? -- Dimensional Modeling Use Case: Advanced Data Stealing Threats -- Modeling People Processes -- Conclusion -- Notes -- Chapter 12 A Call to Action: How to Roll Out Cybersecurity Risk Management -- Establishing the CSRM Strategic Charter. Organizational Roles and Responsibilities for CSRM -- Getting Audit to Audit -- What the Cybersecurity Ecosystem Must Do to Support You -- Integrating CSRM with the Rest of the Enterprise -- Can We Avoid the Big One? -- Appendix A Selected Distributions -- Distribution Name: Triangular -- Distribution Name: Binary -- Distribution Name: Normal -- Distribution Name: Lognormal -- Distribution Name: Beta -- Distribution Name: Power Law -- Appendix B Guest Contributors -- Decision Analysis to Support Ransomware Cybersecurity Risk Management -- Bayesian Networks: One Solution for Specific Challenges in Building ML Systems in Cybersecurity -- The Flaw of Averages in Cyber Security -- Botnets -- Password Hacking -- How Catastrophe Modeling Can Be Applied to Cyber Risk -- Notes -- Index -- EULA. |
Record Nr. | UNINA-9910713827803321 |
Hubbard Douglas W. <1962->
![]() |
||
Wiley-Blackwell | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
How to measure anything in cybersecurity risk / / Douglas W. Hubbard, Richard Seiersen |
Autore | Hubbard Douglas W. <1962-> |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2016 |
Descrizione fisica | 1 online resource (299 p.) |
Disciplina | 658.4/78 |
Collana | THEi Wiley ebooks |
Soggetto topico |
Cyberterrorism
Cyberspace - Security measures Risk management |
ISBN |
1-119-22461-6
1-119-22460-8 1-119-16231-9 |
Classificazione | BUS061000COM053000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
How to Measure Anything in Cybersecurity Risk; Contents; Foreword; Foreword; Acknowledgments; About the Authors; Introduction; Why This Book, Why Now?; What Is This Book About?; What to Expect; Is This Book for Me?; We Need More Than Technology; New Tools for Decision Makers; Our Path Forward; Part I Why Cybersecurity Needs Better Measurements for Risk; Chapter 1 The One Patch Most Needed in Cybersecurity; The Global Attack Surface; The Cyber Threat Response; A Proposal for Cybersecurity Risk Management; Notes; Chapter 2 A Measurement Primer for Cybersecurity; The Concept of Measurement
Explaining the Elements of the Loss Exceedance CurveGenerating the Inherent and Residual Loss Exceedance Curves; Where Does the Risk Tolerance Curve Come from?; Supporting the Decision: A Return on Mitigation; Where to Go from Here; Notes; Chapter 4 The Single Most Important Measurement in Cybersecurity; The Analysis Placebo: Why We Can't Trust Opinion Alone; How You Have More Data Than You Think; When Algorithms Beat Experts; Some Research Comparing Experts and Algorithms; Why Does This Happen?; So What? Does This Apply to Cybersecurity?; Tools for Improving the Human Component The Subjective Probability ComponentThe Expert Consistency Component; The Collaboration Component; The Decomposition Component; Summary and Next Steps; Notes; Chapter 5 Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk; Scanning the Landscape: A Survey of Cybersecurity Professionals; What Color Is Your Risk? The Ubiquitous-and Risky-Risk Matrix; The Psychology of Scales and the Illusion of Communication; How the Risk Matrix Doesn't Add Up; Amplifying Effects: More Studies Against the Risk Matrix (As If We Needed More); Exsupero Ursus and Other Fallacies Beliefs about the Feasibility of Quantitative Methods: A Hard TruthSame Fallacy: More Forms; The Target Breach as a Counter to Exsupero Ursus; Communication and Consensus Objections; Conclusion; Notes; Part II Evolving the Model of Cybersecurity Risk; Chapter 6 Decompose It Unpacking the Details; Decomposing the Simple One-for-One Substitution Model; Just a Little More Decomposition; A Few Decomposition Strategies to Consider; More Decomposition Guidelines: Clear, Observable, Useful; Decision Analysis: An Overview of How to Think about a Problem; Avoiding "Over-Decomposition" A Summary of Some Decomposition Rules |
Record Nr. | UNINA-9910135014503321 |
Hubbard Douglas W. <1962->
![]() |
||
Hoboken, New Jersey : , : Wiley, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
How to measure anything in cybersecurity risk / / Douglas W. Hubbard, Richard Seiersen |
Autore | Hubbard Douglas W. <1962-> |
Edizione | [1st edition] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , 2016 |
Descrizione fisica | 1 online resource (299 p.) |
Disciplina | 658.4/78 |
Collana | THEi Wiley ebooks |
Soggetto topico |
Cyberterrorism
Cyberspace - Security measures Risk management |
ISBN |
1-119-22461-6
1-119-22460-8 1-119-16231-9 |
Classificazione | BUS061000COM053000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
How to Measure Anything in Cybersecurity Risk; Contents; Foreword; Foreword; Acknowledgments; About the Authors; Introduction; Why This Book, Why Now?; What Is This Book About?; What to Expect; Is This Book for Me?; We Need More Than Technology; New Tools for Decision Makers; Our Path Forward; Part I Why Cybersecurity Needs Better Measurements for Risk; Chapter 1 The One Patch Most Needed in Cybersecurity; The Global Attack Surface; The Cyber Threat Response; A Proposal for Cybersecurity Risk Management; Notes; Chapter 2 A Measurement Primer for Cybersecurity; The Concept of Measurement
Explaining the Elements of the Loss Exceedance CurveGenerating the Inherent and Residual Loss Exceedance Curves; Where Does the Risk Tolerance Curve Come from?; Supporting the Decision: A Return on Mitigation; Where to Go from Here; Notes; Chapter 4 The Single Most Important Measurement in Cybersecurity; The Analysis Placebo: Why We Can't Trust Opinion Alone; How You Have More Data Than You Think; When Algorithms Beat Experts; Some Research Comparing Experts and Algorithms; Why Does This Happen?; So What? Does This Apply to Cybersecurity?; Tools for Improving the Human Component The Subjective Probability ComponentThe Expert Consistency Component; The Collaboration Component; The Decomposition Component; Summary and Next Steps; Notes; Chapter 5 Risk Matrices, Lie Factors, Misconceptions, and Other Obstacles to Measuring Risk; Scanning the Landscape: A Survey of Cybersecurity Professionals; What Color Is Your Risk? The Ubiquitous-and Risky-Risk Matrix; The Psychology of Scales and the Illusion of Communication; How the Risk Matrix Doesn't Add Up; Amplifying Effects: More Studies Against the Risk Matrix (As If We Needed More); Exsupero Ursus and Other Fallacies Beliefs about the Feasibility of Quantitative Methods: A Hard TruthSame Fallacy: More Forms; The Target Breach as a Counter to Exsupero Ursus; Communication and Consensus Objections; Conclusion; Notes; Part II Evolving the Model of Cybersecurity Risk; Chapter 6 Decompose It Unpacking the Details; Decomposing the Simple One-for-One Substitution Model; Just a Little More Decomposition; A Few Decomposition Strategies to Consider; More Decomposition Guidelines: Clear, Observable, Useful; Decision Analysis: An Overview of How to Think about a Problem; Avoiding "Over-Decomposition" A Summary of Some Decomposition Rules |
Record Nr. | UNINA-9910826265403321 |
Hubbard Douglas W. <1962->
![]() |
||
Hoboken, New Jersey : , : Wiley, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
HPCC/ICESS/CSS 2014 : 16th IEEE International Conference on High Performance Computing and Communications : 11th IEEE International Conference on Embedded Software and Systems : 6th International Symposium on Cyberspace Safety and Security : proceedings : 20-22 August 2014, Paris, France / / sponsored by IEEE, IEEE Computer Society, IEEE Technical Committee on Scalable Computing |
Pubbl/distr/stampa | Los Alamitos, California : , : IEEE Computer Society, , 2014 |
Descrizione fisica | 1 online resource (91 pages) |
Disciplina | 004.3 |
Soggetto topico |
High performance computing
Telecommunication systems Cyberspace - Security measures |
ISBN | 1-4799-6123-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Pages 1-644 -- 2. Pages 645-1295. |
Record Nr. | UNINA-9910131346603321 |
Los Alamitos, California : , : IEEE Computer Society, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
HPCC/ICESS/CSS 2014 : 16th IEEE International Conference on High Performance Computing and Communications : 11th IEEE International Conference on Embedded Software and Systems : 6th International Symposium on Cyberspace Safety and Security : proceedings : 20-22 August 2014, Paris, France / / sponsored by IEEE, IEEE Computer Society, IEEE Technical Committee on Scalable Computing |
Pubbl/distr/stampa | Los Alamitos, California : , : IEEE Computer Society, , 2014 |
Descrizione fisica | 1 online resource (91 pages) |
Disciplina | 004.3 |
Soggetto topico |
High performance computing
Telecommunication systems Cyberspace - Security measures |
ISBN | 1-4799-6123-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Pages 1-644 -- 2. Pages 645-1295. |
Record Nr. | UNISA-996279288703316 |
Los Alamitos, California : , : IEEE Computer Society, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information security [[electronic resource] ] : better implementation of controls for mobile devices should be encouraged : report to congressional committees |
Pubbl/distr/stampa | [Washington, D.C.] : , : U.S. Govt. Accountability Office, , [2012] |
Descrizione fisica | 1 online resource (iii, 48 pages) : illustrations (some color) |
Soggetto topico |
Smartphones - Security measures - Government policy - United States
Mobile computing - Security measures - Government policy - United States Cyberspace - Security measures Portable computers - Security measures - United States Wireless communication systems - Security measures - United States Mobile communication systems - Security measures - United States Cell phones - Security measures - United States Data protection - United States |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Information security |
Record Nr. | UNINA-9910704312303321 |
[Washington, D.C.] : , : U.S. Govt. Accountability Office, , [2012] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|